Network Security

12345678910111213141516171819
Across
  1. 5. any program or code designed to do something on a system or network that you don’t want to have happen.
  2. 6. software tools and programs designed to identify and prevent malicious software, or malware, from infecting computer system or electric devices
  3. 9. A program that monitors the types of websites you frequent and uses that information to generate targeted advertisements.
  4. 12. Can sustain network operations for only a limited time in the event of an outage.
  5. 13. Redundant ___ eliminates a single point of power failure.
  6. 15. a program that has two jobs: to replicate and to activate.
  7. 17. functions similar to a virus. It replicates exclusively through networks.
  8. 18. Horse- is a piece of malware that looks or pretends to do one thing while, at the same time, doing something bad.
  9. 19. (IPS)- similar to IDS, but adds the capability to react to an attack (Active)
Down
  1. 1. occurs when a user identifies himself to the system, and the identity is verified against an authentication database
  2. 2. Engineering is the process of using or manipulating people inside the network environment to gain access to that network from the outside
  3. 3. (AUP) states what users are allowed and not allowed to do on the company’s network
  4. 4. protect entire buildings for sustained periods to ensure mission-critical devices remain functional.
  5. 7. Provides incremental trunk speeds by combining multiple Fast Ethernet links.
  6. 8. uses duplication of critical components/devices, increasing the reliability of the system.
  7. 9. software that detects, prevents, and removes viruses, worms, and other malware from a computer
  8. 10. diving- when a person goes through the trash in order to find personal information
  9. 11. - using another person's wireless network without permission.
  10. 14. the 2nd most common firewall tool ensuring port security through port filtering
  11. 16. a function of any program that sends information about your system or your actions over the Internet.